14.04.2015 Views

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

The Exploit: A Theory of Networks - asounder

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

82 Nodes<br />

in terms <strong>of</strong> probability and thinking in terms <strong>of</strong> possibility. Informatic<br />

spaces do not bow to political pressure or influence, as social spaces<br />

do. But informatic spaces do have bugs and holes, a by - product <strong>of</strong><br />

high levels <strong>of</strong> technical complexity, which make them as vulnerable<br />

to penetration and change as would a social actor at the hands <strong>of</strong><br />

more traditional political agitation.<br />

Let us reiterate that we are referring only to protocological resistance<br />

and in no way whatsoever suggest that non - protocological practice<br />

should abandon successful techniques for effecting change such<br />

as organizing, striking, speaking out, or demonstrating. What we suggest<br />

here is a supplement to existing practice, not a replacement for it.<br />

<strong>The</strong> goal for political resistance in life networks, then, should be the discovery<br />

<strong>of</strong> exploits—or rather, the reverse heuristic is better: look for traces<br />

<strong>of</strong> exploits, and you will find political practices.<br />

Let’s flesh out this idea using examples from actual practice, from<br />

specific scenarios. <strong>The</strong> first is an instance <strong>of</strong> the protocological masquerading<br />

as biological: the computer virus. Deleuze mentions computer<br />

viruses in his 1990 interview with Negri:<br />

It’s true that, even before control societies are fully in place, forms <strong>of</strong><br />

delinquency or resistance (two different things) are also appearing.<br />

Computer piracy and viruses, for example, will replace strikes and what<br />

the nineteenth century called “sabotage” (“clogging” the machinery). 60<br />

Computer viruses have a spotted history; they <strong>of</strong>ten involve innovative<br />

programming techniques that have been used in other areas <strong>of</strong><br />

computer science, but they are also <strong>of</strong>ten tagged as being part <strong>of</strong> delinquent<br />

or criminal activities. Should computer viruses be included in<br />

the “history” <strong>of</strong> computers? How much have viruses and antivirus<br />

programs contributed to the development <strong>of</strong> “<strong>of</strong>ficial” computer science<br />

and programming? <strong>The</strong> majority <strong>of</strong> the early instances <strong>of</strong> computer<br />

viruses have ties to either the university or the corporation: the<br />

“Darwin” game (AT&T/ Bell Labs, early 1960s), “Cookie Monster”<br />

(MIT, mid - 1960s), “Creeper” and “Reaper” (BBN, early 1970s), “tapeworm”<br />

(XeroxPARC, early 1970s), and so on. 61 Like early hacking<br />

activities, their intent was mostly exploratory. Unlike hacking, how-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!